Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
52acb68b583aa4cbc468cc9667e53c11_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52acb68b583aa4cbc468cc9667e53c11_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
52acb68b583aa4cbc468cc9667e53c11_JaffaCakes118.html
-
Size
67KB
-
MD5
52acb68b583aa4cbc468cc9667e53c11
-
SHA1
76a5e3c407d99456216b477a37ad42b992cde804
-
SHA256
4f9e628082010ebfe7b667f82e34d95058e20df99110c0d0d4882e9bbc12e5a7
-
SHA512
5e5ad4efe5a46c292efc3c0207184e7fdc14414f4c68aeaeeaac5b94e82ab568913213f293fc281a218a5fa4eeaed5d5a4836f1e87ac1b841e4f2eb1cc337bd1
-
SSDEEP
1536:AzVJEHD4WiHINA9AIgYTmS+zM+1gEeq653soLtJ2:A0NA9AIgYTmM+Cq2LtJ2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1852 msedge.exe 1852 msedge.exe 2704 identity_helper.exe 2704 identity_helper.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2680 1852 msedge.exe 84 PID 1852 wrote to memory of 2680 1852 msedge.exe 84 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 3280 1852 msedge.exe 85 PID 1852 wrote to memory of 1624 1852 msedge.exe 86 PID 1852 wrote to memory of 1624 1852 msedge.exe 86 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87 PID 1852 wrote to memory of 2464 1852 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\52acb68b583aa4cbc468cc9667e53c11_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6dfa46f8,0x7ffa6dfa4708,0x7ffa6dfa47182⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3040 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6308 /prefetch:82⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2276 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6361735421198767382,3839524941092004170,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
26KB
MD52acfb73fd2df022a7dad5595adef5bda
SHA1939b803ea641bd427b7599f92a816262e7a5bf48
SHA2563d4610a2ab69d08e54685d0d3cfcf03ec663bacff8cc89a1e0a2904a7769e641
SHA5125978a8866bbb30d409f728c4cc1081af19e3dcaedf2e4f0e1d9e40b75c0e80ecd6474cff4204114716f30ac832bfdb6787726caf504d2305332f151664d3e15d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5899837a79100bfcf70e64558b4edd97b
SHA1765ec4fc0acd339b29144f02c1e250a7ca4a2e71
SHA256e191bcfe716068d5d2f7babd6a65857a040a9e383458687da57c308b38266573
SHA512b744d487a130b281ffaf52959c2d28dd8c3ca45a31def6a45fc73534f21a67fbabea86b55de35ab213fb0d7983e9c1830f453406f52fd0288db5f3ae27158a63
-
Filesize
2KB
MD5058589aabbfd0ff1d79ebf2c9222ea7f
SHA19175f0061f1fa8c878159de2355dedc52d8a6430
SHA256cdbefab04f3e15541022c5b808f3ffc972ad76fb7814b0da29c45eca9a339b2b
SHA512aa853f3a225f45ef9bfeb445b0fa95e0a8ea58ee409cfa46fd7a5f569a1801b3b0aa57b6b1d5a6b6399c061222606ef030484f3d2d47ff3d530ed253873abbf2
-
Filesize
5KB
MD50ea7d70a1ea0f831d4e57b6e9b97cb6c
SHA1ab79a62ae9e9741d9c63e0036a2d97c3c843bfa6
SHA2567d64d3a94f3c5739a388a3a5a23dffa4b59c4f0ff626cd26f43cb90077274d27
SHA512fddacda6a9f43a4239dc39243500b9cf0bcb491d6af74fe57b60a20346b113db298cb9d5ef24c9291912d63524954cebedf4401758dc21808840671c5fd50257
-
Filesize
7KB
MD5dd9a8123d2fa8454b6c522a5fabab58d
SHA1f139d33160c673fa175792cf8fc4c8e6d3522868
SHA256b8d2d8a144ff97d36c602f1d1031ca1c819c3222f66a84337772b269b7330214
SHA51230388828d19852ba85d5e3f43a77f2058eafc4a1fd780416f6da3cae4ecaa8a008fb17d129c8497057fb4812b972c1fb0a371ac4e0ccae11371fcdf1243e92a4
-
Filesize
7KB
MD5f004dd01a9dc52ed08df9ababac407bc
SHA14f047a64d162601231a7c9a304b54c9f3e603f38
SHA256a3871dacaa3dbdffb97265d208aacc103839a0d613f7236536fe1c03f40724a2
SHA512112a30dd0a72a88159f91ab879b17b41e02a44e6fc9577e4ddbe0c320a02159297b533d777c1741e0fcedc8ec0b50197cb2ae3871f888384fd4b74ce74d11d02
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD51fc79f9c505de92900621d2eec3ad1f5
SHA11fe2419fa4585ee25a2a4b7bccd304d6cb591a01
SHA256136342728aa78cb1ab1d57a42c290e1223a049ca10633d41b3c1d53ec65402eb
SHA512b064ca123f2e55aea8e7ba13d72931049a9356cb389715c422623df5920b4de5630a3a50a9d13f936dc6e34ce6f8e453b49296d02b4c0f040b190a790cd3efad